For the past few weeks I have been on updating, or more accurately, improving www.becometheboss.net. The idea for the improvements started back in August when I bought my ASUS Eee Pad aka ANDROID TRANSFORMER tablet. It has two cameras - a back facing high definition camera and a lower resolution front facing camera. I think you know where I am going with this.
Saturday, December 10, 2011
philip ramsey - Google+
Monday, November 21, 2011
Index of /wp-content/plugins/extended-comment-optionsLately, I've been receiving spam mail from a compromised Hotmail account that sends out links to compromised Wordpress blogs. Or maybe the Wordpress blogs were setup specifically to redirect visitors to phishing sites that are part of a bot.net network.
Monday, October 17, 2011
Sunday, July 3, 2011
I came across this Free eBook: How to Monitor Your Social Media Presence in 10 Minutes a Day and thought it would be great to get. When I clicked on the link, I was presented with a form requesting that all fields be completed including my phone number business information. Because of the recent spate of successful cyber attacks against businesses and governments lately, I immediately checked if the page was encrypted or not.
Thursday, March 24, 2011
I have been doing personal income tax preparation ever since taking H&R Block's income tax course in the fall of 1988 and worked for H&R Block during the tax season in 1989. Back then I prepared taxes by hand using the tax forms, provided by Revenue Canada, and a pencil. The pencil was necessary as it is easy to erase a mistake when it is written lead.
Wednesday, March 23, 2011
W5's segment on Investigating Canada's big cyber security problem only highlights the tip of the iceberg. In my articles on Wednesday, January 13, 2010 Google vs China - Googles response to attacks by China, Friday, January 15, 2010 Internet Explorer Flaw Implicated in Chinese Attacks and Monday, February 22, 2010 Technology Review: Corporations, agencies infiltrated by 'botnet' I provided my insight into how computer security breaches may be easily avoided - DO NOT USE MICROSOFT PRODUCTS.
Saturday, February 5, 2011
In the article "A Job Applicant? Nope, It's A Malware Attack" businesses may avoid the costs and headaches associated with the security issues of Microsoft products, especially Windows security issues, by using open source software and Linux. For true security, the use of x64 (64 bit) Linux is essential. There are many distributions of Linux. Each are developed for specific environments, i.e. business, home, pleasure, multimedia, development, entertainment etc.
Wednesday, February 2, 2011
While attempting to login to your site via https://www.cch.ca/MyAccount/login.aspx I noticed the encryption is broken. Further investigation revealed a stylesheets and a number of scripts that are hosted on Google that are not encrypted. As a company that claims to be concerned with security why are CSS and JS files hosted by Google needed on your login page? Why do you want to give your users credentials to the world's most powerful search engine. I certainly do not want my CCH username and password showing up in Google's search results.